{ "document": { "category": "csaf_vex", "csaf_version": "2.0", "lang": "en-US", "publisher": { "category": "coordinator", "contact_details": "https://www.cisa.gov/report", "issuing_authority": "CISA", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "title": "TrueFiling authorization bypass via user-controlled keys", "tracking": { "current_release_date": "2025-02-20T00:00:00Z", "generator": { "engine": { "name": "VINCE-NT", "version": "1.7.0" } }, "id": "VA-25-017-01", "initial_release_date": "2025-01-16T00:00:00Z", "status": "final", "version": "1.0.1", "revision_history": [ { "number": "1.0.1", "summary": "Update CVSS", "date": "2025-02-20T00:00:00Z" }, { "number": "1.0.0", "summary": "Initial publication", "date": "2025-01-16T00:00:00Z" } ] }, "distribution": { "tlp": { "label": "WHITE" } }, "notes": [ { "text": "All information products included in [https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white](https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white) are provided \\\"as is\\\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see [https://us-cert.cisa.gov/tlp/](https://us-cert.cisa.gov/tlp/).", "title": "Legal Notice", "category": "legal_disclaimer" }, { "text": "United States", "title": "Countries and Areas Deployed", "category": "other" }, { "text": "Information Technology", "title": "Critical Infrastructure Sectors", "category": "other" }, { "text": "TrueFiling trusts some client-controlled identifiers passed in URL requests to retrieve information. Platform users must self-register for an account, and once authenticated, could manipulate those identifiers to gain partial access to case information and the ability to partially change user access to case information.", "title": "Risk Evaluation", "category": "summary" }, { "text": "This vulnerability was addressed in version 3.1.112.19 and all instances were updated by 2024-11-08. No user action is required.", "title": "Recommended Practices", "category": "general" }, { "text": "Nashville, TN, United States", "title": "Company Headquarters Location", "category": "other" } ], "references": [ { "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-017-01.json", "summary": "Vulnerability Advisory VA-25-017-01 CSAF", "category": "self" } ] }, "product_tree": { "branches": [ { "category": "vendor", "name": "i3 Verticals", "branches": [ { "category": "product_name", "name": "TrueFiling", "branches": [ { "category": "product_version_range", "name": "<3.1.112.19", "product": { "name": "i3 Verticals TrueFiling <3.1.112.19", "product_id": "CSAFPID-0001" } }, { "category": "product_version", "name": "3.1.112.19", "product": { "name": "i3 Verticals TrueFiling 3.1.112.19", "product_id": "CSAFPID-0002" } } ] } ] } ] }, "vulnerabilities": [ { "cve": "CVE-2024-11146", "cwe": { "id": "CWE-807", "name": "Reliance on Untrusted Inputs in a Security Decision" }, "notes": [ { "category": "summary", "text": "TrueFiling is a collaborative, web-based electronic filing system where attorneys, paralegals, court reporters and self-represented filers collect public legal documentation into cases. TrueFiling is an entirely cloud-hosted application. Prior to version 3.1.112.19, TrueFiling trusted some client-controlled identifiers passed in URL requests to retrieve information. Platform users must self-register for an account, and once authenticated, could manipulate those identifiers to gain partial access to case information and the ability to partially change user access to case information. This vulnerability was addressed in version 3.1.112.19 and all instances were updated by 2024-11-08.", "title": "Description" }, { "category": "details", "title": "SSVC", "text": "SSVCv2/E:N/A:Y/T:P/2025-01-17T04:58:23Z/" } ], "title": "TrueFiling authorization bypass via user-controlled keys", "product_status": { "known_affected": [ "CSAFPID-0001" ], "fixed": [ "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "raw.githubusercontent.com", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2024/va-25-017-01.json" }, { "category": "external", "summary": "infosec.exchange", "url": "https://infosec.exchange/@abreacher" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "remediations": [ { "category": "vendor_fix", "details": "This vulnerability was addressed in version 3.1.112.19 and all instances were updated by 2024-11-08.", "product_ids": [ "CSAFPID-0001" ], "date": "2024-11-08T05:00:00Z" }, { "category": "vendor_fix", "details": "This vulnerability was addressed in version 3.1.112.19 and all instances were updated by 2024-11-08.", "product_ids": [ "CSAFPID-0002" ], "date": "2024-11-08T05:00:00Z" } ], "acknowledgments": [ { "names": [ "Alison Breacher" ] } ], "release_date": "2025-01-17T00:00:00Z" } ] }